Author: John Wiley

John Wiley is a Cyber security Evangelist, Researcher, Author & Speaker. He is a Security Writer & Editor-in-Chief, Author of W-Se Web Security Council.

Top 2019 Antivirus Applications For your Android Smartphone

There’s no real sense of losing your mobile telephone, whether it’s down on the back of the sofa or at night or not. These days our smartphones are all to us, or at least they can be. Debit cards, personal computers, dating simulators, entertainment devices without touch. And you would not leave your smartphone in…

Kaspersky Patches Many Internet Security Vulnerabilities

Kaspersky’s internet security features in its anti-virus, Internet Security, Full Security, Free Anti-Virus, Safety Cloud and Small Office Security products have been patched with several vulnerabilities. Researcher Wladimir Palant told Kaspersky in December 2018 that he had found some vulnerabilities associated with brand characteristics that are designed to block ads and trackers. The issue was…

Current ‘ Ginp ‘ Trojan Payment Card Information Credentials for Android

A newly found Android banking trojan with a narrow goal list and two-stage overlays is capable of robbing login and credit card credentials, reports ThreatFabric. Dubbed Ginp and discovered in October, the malware is around since June and since then has had five major updates with the new version copied from the trojan Anubis. Ginp…

How Limetorrents is a Popular Media Pirate Search Engine

LimeTorrent may not be the most popular on the list, but fortunately its dedicated user base can expect changes soon. Content on LimeTorrent is categorized— and adult content separated — to make it easier to find specific things, unlike some other torrent websites. The easy interface of LimeTorrent makes it easy for users to find…

Default Mozilla to Block Fingerprinters in Firefox 72

Mozilla plans to block Fingerprinters as part of its Enhanced Tracking Protection feature by default in Firefox 72, which is due to release in January 2020. Fingerprinters are a tracking method that allows a company, instead of using cookies, to track you based on your computer’s features. This is done by creating a profile of…

Silly Phishing Spotlight: Microsoft Excel Unblock Login

As part of our continuous series to educate users about some of the stupid phishing scams, we bring a new one which states that Excel is blocked if you do not login and verify your data. While people learn more about phishing scams and how to spot them, scammers continue to create odd strategies to…

Overview of Web Application Penetration Testing Checklist

The penetration check is a method by which trained security experts (such as penetration testing or ethical hackers) test a code to detect its security vulnerabilities. The purpose of such a test is to validate the security vulnerabilities that may exist in the code so that hacking community does not exploit it (or benefit from…

Google Provides up to $1.5 Million for Titan M pixel Operations

Google revealed on Thursday that it is extending its Android bug bounty program, and certain forms of vulnerabilities may now win researchers up to $1.5 million. Google says it’s spent over $4 million on more than 1,800 vulnerability reports since its Android Security Rewards in 2015. Over the last year, payouts totalled more than 1,5…

Business Intelligence and Data Security Awareness

Globally, business leaders appreciate reduced costs and improved efficiency, which allows them to make a better decision. The new era of business intelligence policy, which relies on data analysis, has been launched. Although most business leaders expect this to help them improve their business operations, very few consider the full impact of business intelligence. Vulnerabilities…

Amnesty International Facebook Lists Abusers of Google Equality

Amnesty Internationale issued a disgraceful complaint against the world’s dominant Internet companies in a new report, arguing that Google and Facebook should be forced to abandon what it calls their surveillance-based business model because it’s’ pronounced against human rights abusses.’ The study said that the policy of the organization to vacuum personal data to feed…